MALICIOUS (1) campaign cataloged at 2025-03-10(2).
- The campaign has clearly malicious intent, like infostealers.
- This is just the date of creating the catalog entry. It may not reflect the date of creation of the campaign itself.
2025-03-ccxt-mexc-futures¶
There is a hidden code that overwrites the default method and downloads remote data, which contains the dictionary pretending to be the right value, and a hidden code to exfiltrate machine ID and download and run a remote code.
Abuse categories¶
action-hidden-in-lib-usage
Campaign uses action-hidden-in-lib-usage.
obfuscation
Campaign uses obfuscation.
remote_script
Downloads and executes a remote malicious script.
IoCs & related URLs¶
URLs with payloads, characteristic domains, C&C IPs, repositories with malicious code, etc.
-
hxxps://v3.mexc.workers.dev/describe.json
-
hxxps://update.mexc.workers.dev/
-
update.mexc.workers.dev
-
v3.mexc.workers.dev
-
mexc.workers.dev